An Improved Data Hiding Technique Using Context Aware System
Saved in:
Published in | Indian journal of science and technology Vol. 12; no. 6; pp. 1 - 8 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
01.02.2019
|
Online Access | Get full text |
Cover
Loading…
Author | Aborokbah, Majed |
---|---|
Author_xml | – sequence: 1 givenname: Majed surname: Aborokbah fullname: Aborokbah, Majed |
BookMark | eNot0MtOwzAQBVALFYlS-g34B0LG71hiE4VHK1ViQVhbTuxAKpIUOxT6933O5s5opLs4t2jSD71H6J7AA1E8E2m7jmNKgeh0S2grU8IJZ-oKTUErngjJxeSyy4zLGzSPcQ2HYTQDBVP0mPd42W3CsPUOP9nR4kXr2v4Tl77-6tufX48_4vEuhn70_yPO_2zw-H0XR9_doevGfkc_v-QMlS_PZbFIVm-vyyJfJbVWKmGiokRRBTazXnjhLHAA6XRmNReS1g6Iqxg5PBtlBdBGVzUIXzEKjjWazZA619ZhiDH4xmxC29mwMwTMicEcGcyRwZwYzJmB7QFFblNk |
Cites_doi | 10.1179/1743131X14Y.0000000078 https://doi.org/10.1016/j.eswa.2009.12.072 https://doi.org/10.1109/TCE.2010.5506028 https://doi.org/10.1109/ICWS.2013.26 https://doi.org/10.4018/IJDCF.2015010102 https://doi.org/10.1049/ip-vis:20000104 https://doi.org/10.1109/LSP.2011.2114651 https://doi.org/10.1109/CISIM.2010.5643649 https://doi.org/10.1109/MDM.2011.17 https://doi.org/10.1109/CICN.2012.52 https://doi.org/10.1049/iet-ipr.2007.0220 https://doi.org/10.1109/CyberC.2012.79 https://doi.org/10.1049/iet-ipr.2009.0226 https://doi.org/10.1145/2444776.2444791 |
ContentType | Journal Article |
CorporateAuthor | Faculty of Computers and Information Technology, University of Tabuk, Tabuk City, Saudi Arabia |
CorporateAuthor_xml | – name: Faculty of Computers and Information Technology, University of Tabuk, Tabuk City, Saudi Arabia |
DBID | AAYXX CITATION |
DOI | 10.17485/ijst/2019/v12i6/141437 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Sciences (General) |
EISSN | 0974-5645 |
EndPage | 8 |
ExternalDocumentID | 10_17485_ijst_2019_v12i6_141437 |
GroupedDBID | 29I 2WC 8R4 8R5 AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION FRP GX1 OK1 OVT Q2X RNS TR2 |
ID | FETCH-LOGICAL-c977-35b217270a8ae5e5da04006d98a94562cd01db31ae5f7a502f9bc05eb320d3f93 |
ISSN | 0974-6846 |
IngestDate | Tue Jul 01 03:00:00 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 6 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c977-35b217270a8ae5e5da04006d98a94562cd01db31ae5f7a502f9bc05eb320d3f93 |
OpenAccessLink | https://sciresol.s3.us-east-2.amazonaws.com/IJST/Articles/2019/Issue-6/Article7.pdf |
PageCount | 8 |
ParticipantIDs | crossref_primary_10_17485_ijst_2019_v12i6_141437 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2019-02-01 |
PublicationDateYYYYMMDD | 2019-02-01 |
PublicationDate_xml | – month: 02 year: 2019 text: 2019-02-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | Indian journal of science and technology |
PublicationYear | 2019 |
References | Thyagaraju GS, Umakant P Kulkarni. (ref1) 2012; 40 Tsai P. (ref9) 2009; 3 Chakraborty S and Raghavan KR, Johnson MP, Srivastava MB. (ref17) 2013 Ukil A. (ref18) Narmatha C, Manimegalai P and Manimurugan S. (ref6) 2017; (3) Fallahpour M, Megias D, Ghanbari M. (ref12) 2011; 5 Aniket Pingley George, Wei Yu, Nan Zhang George, Xinwen Fu and Wei Zhao. (ref16) 2012; 56 Xinpeng Zhang. (ref11) 2011; 18 Manimurugan S and Narmatha C. (ref4) 2015; 7 Yu Chen Hu. (ref8) 2003; 3 Pandit AA and Kumar A. (ref21) 2012 Amit Phadikar, Santi P Maity. (ref10) 2010; 56 Kapitsaki GM. (ref15) 2013 Riboni D, Pareschi L and Bettini C. (ref20) 2011 Narmatha C, Manimegalai P and Manimurugan S. (ref3) 2018; 7 Almutairi S, Aldabbas H and Abu-Samaha A. (ref13) 2012; 4 Gaud N, Deen A, Silakari S. (ref14) 2012 Lee Y, Kwon O. (ref19) 2010; 37 Manimurugan S, Porkumaran K, Narmatha C. (ref5) 2014; 62 Wu DC and Tsai WH. (ref7) 2000; 147 Narmatha C, Manimegalai P and Manimurugan S. (ref2) 2018; 13 |
References_xml | – volume: 62 start-page: 403 issue: (8) year: 2014 ident: ref5 article-title: The New Block Pixel Sort Algorithm for TVC Encrypted Medical Image. publication-title: Imaging Science Journal. doi: 10.1179/1743131X14Y.0000000078 – volume: (3) start-page: 96 year: 2017 ident: ref6 article-title: The Secure Lossless Compression Scheme for Grayscale Medical Images Using PBT and Modified Steganography. publication-title: Journal of Advanced Research in Dynamical and Control Systems. Recent Trends in Engineering and Managerial Excellence. – volume: 37 start-page: 5192 year: 2010 ident: ref19 article-title: An index-based privacy preserving service trigger in context-aware computing environments. publication-title: School of International Management, Kyunghee University, Seochun, Ghiheung, Yongin, Kyunggi-do, South Korea. Expert Systems with Applications. doi: https://doi.org/10.1016/j.eswa.2009.12.072 – volume: 56 issue: (2) year: 2010 ident: ref10 article-title: ROI Based Error Concealment of Compressed Object Based Image using QIM Data Hiding and Wavelet Transform. publication-title: IEEE Transactions on Consumer Electronics. doi: https://doi.org/10.1109/TCE.2010.5506028 – volume: 13 start-page: 1 year: 2018 ident: ref2 article-title: A Grayscale Image Hiding Encode Scheme for Secure Transmission. publication-title: Current Signal Transduction Therapy. – volume: 7 start-page: 110 issue: (3-6) year: 2018 ident: ref3 article-title: A Decode Technique of MSI for Efficient Reconstruction Process. publication-title: International Journal of Engineering & Technology. – year: 2013 ident: ref15 article-title: Reflecting user privacy preferences in context-aware Web Services. Department of Computer Science University of Cyprus Nicosia, Cyprus. publication-title: Proceedings of the IEEE 20th International Conference on Web Services. doi: https://doi.org/10.1109/ICWS.2013.26 – volume: 7 start-page: 26 issue: (1) year: 2015 ident: ref4 article-title: Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions. publication-title: International Journal of Digital Crime and Forensics (IJDCF) doi: https://doi.org/10.4018/IJDCF.2015010102 – volume: 147 issue: (1) year: 2000 ident: ref7 article-title: Spatial-domain image hiding using image differencing. publication-title: IEE Proceedings - Vision, Image and Signal Processing. doi: https://doi.org/10.1049/ip-vis:20000104 – volume: 18 start-page: 255 issue: (4) year: 2011 ident: ref11 article-title: Reversible Data Hiding in Encrypted Image. publication-title: IEEE Signal Processing Letters. doi: https://doi.org/10.1109/LSP.2011.2114651 – ident: ref18 article-title: Context Protecting Privacy Preservation in Ubiquitous Computing. Innovation Labs, Tata Consultancy Services, Kolkata, India. publication-title: Proceedings of the IEEE CISIM 2010, Krakow, Poland. doi: https://doi.org/10.1109/CISIM.2010.5643649 – volume: 40 start-page: 47 issue: (3) year: 2012 ident: ref1 article-title: Design and Implementation of User Context aware Recommendation Engine for Mobile using Bayesian Network, Fuzzy Logic and Rule Base. publication-title: International Journal of Computer Applications. – volume: 56 start-page: 2551 issue: (11) year: 2012 ident: ref16 article-title: A context-aware scheme for privacy-preserving location-based services. publication-title: The International Journal of Computer and Telecommunications Networking Archive. – start-page: 1 year: 2011 ident: ref20 article-title: Integrating Identity, Location, and Absence Privacy in Context-aware Retrieval of Points of Interest. University, degli Studi di Milano, D.I. Co., EveryWare Lab. publication-title: 12th IEEE International Conference. doi: https://doi.org/10.1109/MDM.2011.17 – volume: 4 issue: (3) year: 2012 ident: ref13 article-title: Review on the security related issues in context aware system. De Montfort University, software technology research laboratory (STRL) Leicester, United Kingdom. publication-title: Proceedings of the International Journal of Wireless & Mobile Networks (IJWMN). – year: 2012 ident: ref14 article-title: Architecture for discovery of context-aware web services based on privacy preferences. Computer Science & Engineering, U.I.T, R.G.P.V. Bhopal, Madhya Pradesh, India. publication-title: Proceedings of the Fourth International Conference on Computational Intelligence and Communication Networks. doi: https://doi.org/10.1109/CICN.2012.52 – volume: 3 start-page: 100 issue: (2) year: 2009 ident: ref9 article-title: Histogram-based reversible data hiding for vector quantisation-compressed images. publication-title: IET Image Process. doi: https://doi.org/10.1049/iet-ipr.2007.0220 – start-page: 435 year: 2012 ident: ref21 article-title: Conceptual Framework and a Critical Review for Privacy Preservation in Context Aware Systems. publication-title: Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover IEEE. doi: https://doi.org/10.1109/CyberC.2012.79 – volume: 5 start-page: 190 issue: (2) year: 2011 ident: ref12 article-title: Reversible and high-capacity data hiding in medical images. publication-title: IET Image Process. doi: https://doi.org/10.1049/iet-ipr.2009.0226 – start-page: 26 year: 2013 ident: ref17 article-title: A Framework for Context-Aware Privacy of Sensor Data on Mobile Systems. publication-title: University of California, Los Angeles. ACM HotMobile'13, doi: https://doi.org/10.1145/2444776.2444791 – volume: 3 start-page: 202 issue: (2) year: 2003 ident: ref8 article-title: Grey-level image hiding scheme based on vector quantization. publication-title: Electronics Letters. |
SSID | ssj0000328070 |
Score | 2.1197293 |
SourceID | crossref |
SourceType | Index Database |
StartPage | 1 |
Title | An Improved Data Hiding Technique Using Context Aware System |
Volume | 12 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA5aL17E-sA3OXhQytrsM1vwUtRSBT210NuSbLJYha3oquCvdyabblctaL1sS0o_2s50MjM73xdCjjHExUJ2HKFY7ARu6jsidLUjM9jMVcx1ZESSbu-i_jC4GYWj2WGchl1SyLP0Yy6v5D9WhTWwK7JkF7BsBQoL8BzsC1ewMFz_ZGPs6JmmAGSNl6IQrf7YcFQGlTDr0N7Xz3HAo9V9xzmvUqS8npVe50agoKYiMWX7mPnKH913PE9r8ijFfcn2ebAEKds8QL5SNYhhu4A8cKLYdgH1bA1FZr4ESa_mDPWI59a3zrkxmQcx6leMH5DE0sNPAQ9vrjc2XYMAEjY-24ymN-C_7VHV5CDWLAiYIFyCYImBSkqgZbLiQb1gWN8jt2q2oWggMwcHVl_YzvohVhux2ojVNljtEquWqdRSjsE6WbO1Au2Whm-SJZ1vkKaNxi_0xEqGn26S825Op55A0RNo6Qm08gRqPIFaT6DGE2jpCVtk0LsaXPQdey6Gk0K27vihxFPFOBOx0KEOlcBAHCn4z3Wwnk0Vc5X0XXgx4yJkXtaRKQu19D2m_Kzjb5NGPsn1DqGZFBqSOCgbMxn4qZIs416seco9GfCM7RI2_QmSp1L9JPnFAnuLv2WfrM5884A0iudXfQipXiGPjBk_Ad0ZTwQ |
linkProvider | Geneva Foundation for Medical Education and Research |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Improved+Data+Hiding+Technique+Using+Context+Aware+System&rft.jtitle=Indian+journal+of+science+and+technology&rft.au=Aborokbah%2C+Majed&rft.date=2019-02-01&rft.issn=0974-6846&rft.eissn=0974-5645&rft.volume=12&rft.issue=6&rft.spage=1&rft.epage=8&rft_id=info:doi/10.17485%2Fijst%2F2019%2Fv12i6%2F141437&rft.externalDBID=n%2Fa&rft.externalDocID=10_17485_ijst_2019_v12i6_141437 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0974-6846&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0974-6846&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0974-6846&client=summon |